Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Rating: 
Amazon Price: $54.00 $42.68 You save: $11.32 (21%). (as of September 26, 2017 05:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.

Cyberattacks–actions intended to damage adversary computer systems or networks–can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Continue reading “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities”

Hacking: The Next Generation (Animal Guide)

Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

 

  • Learn how “inside out” techniques can poke holes into protected networks
  • Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Price: $39.99

Click here to buy from Amazon

Cyberwar 3.0: Human Factors in Information Operations and Future Conflict

Cyberwar 3.0: Human Factors in Information Operations and Future ConflictWarfare and conflict are no longer just about the clash of uniformed armies and their cutting-edge technology. Conflict in the Information Age is about ideas, values, aspirations, fears and the struggle of people for identity. How will humankind define and wage war in the Infosphere? This book is about a journey into a new place that we have yet to define. It is offered by thinkers in the forefront of American and British government, academic, military, and private industry. Here are some of the issues examined:

• Is Infowar real?
• Who will defend cyberspace?
• What are Information Operations?
• Can and should the military patrol the information highway?
• What are the legal, ethical and moral issues?
• Will information decrease or add to the fog of war?
•Can we safely outsource national security?
• What did Kosovo teach us?
• How would Sun Tzu have employed information war?
• How real is the Insider Threat?
• What is the psychology of future war?
• Will technology be master or servant?
• Can perceptions be managed in peace, crisis and war?
• Who should protect critical infrastructures and how?
• What is the information content in National Security Strategy?

Price: $29.95

Click here to buy from Amazon

Internet Denial of Service: Attack and Defense Mechanisms

Internet Denial of Service: Attack and Defense MechanismsSuddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do?

Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack.

Inside, you'll find comprehensive information on the following topics

  • How denial-of-service attacks are waged
  • How to improve your network's resilience to denial-of-service attacks
  • What to do when you are involved in a denial-of-service attack
  • The laws that apply to these attacks and their implications
  • How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause
  • Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices

The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

Price: $44.99

Click here to buy from Amazon

Unmasked

UnmaskedAnonymous got lucky. When five of its hackers attacked security company HBGary Federal on February 6, 2011, they were doing so in order to defend the group’s privacy. It wasn’t because they hoped to reveal plans to attack WikiLeaks, create surveillance cells targeting pro-union organizations, and sell sophisticated rootkits to the US government for use as offensive cyber weapons—but that’s what they found.

In the weeks after the attack, the hackers released tens of thousands of e-mail messages and made headlines around the world. Aaron Bar, the CEO of HBGary Federal, eventually resigned; 12 Congressman called for an investigation; an ethics complaint was lodged against a major DC law firm involved with some of the more dubious plans.

Join Ars' editors as they dig into the secret world of Anonymous and hackers for hire in Unmasked.

Price: $1.99

Click here to buy from Amazon